
30 Days Free Trial WordPress Hosting
We love WordPress and it’s possibilities. Bring or buy your own domain and get a WordPress website with hosting free for 30 days and then only €3.82/month.
Click here and check it out.
- What’s New in WordPress 7.0? (Features & Screenshots)by Editorial Staff on 20/05/2026 at 18:42
WordPress 7.0 is finally here 🥳, and we’ve been testing it since the early beta. It’s the first major release of 2026, and it’s a big one, with a brand-new AI Connectors screen, responsive block controls, and a refreshed admin experience that makes the dashboard… Read More » The post What’s New in WordPress 7.0? (Features & Screenshots) first appeared on WPBeginner.
- Introducing ActiveLayer: AI-Powered Spam Protection for WordPressby Syed Balkhi on 19/05/2026 at 10:10
Want better spam protection for your WordPress forms without frustrating your visitors? Imagine your contact forms, signup forms, and comments could block spam without having to show a single CAPTCHA to your real visitors. They fill out the form, hit submit, and move on. No… Read More » The post Introducing ActiveLayer: AI-Powered Spam Protection for WordPress first appeared on WPBeginner.
- How to Setup Author SEO in WordPress to Boost Your Google E-E-A-Tby Nouman Yaqoob on 18/05/2026 at 10:00
If you’ve been putting effort into creating great content but still struggling to rank higher on Google, the problem might not be what you’re writing. It could be who Google thinks is writing it. That’s where Author SEO comes in. It’s the practice of optimizing… Read More » The post How to Setup Author SEO in WordPress to Boost Your Google E-E-A-T first appeared on WPBeginner.
************
- LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Rootby info@thehackernews.com (The Hacker News) on 23/05/2026 at 07:35
A maximum-severity security vulnerability impacting LiteSpeed User-End cPanel Plugin has come under active exploitation in the wild. The flaw, tracked as CVE-2026-48172 (CVSS score: 10.0), relates to an instance of incorrect privilege assignment that an attacker could abuse to run arbitrary scripts with elevated permissions. "Any cPanel user (including an attacker or a compromised account) may
- Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEVby info@thehackernews.com (The Hacker News) on 23/05/2026 at 07:23
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw impacting Drupal Core to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2026-9082 (CVSS score: 6.5), an SQL injection vulnerability affecting all supported versions of Drupal Core. "Drupal Core
- First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groupsby info@thehackernews.com (The Hacker News) on 22/05/2026 at 17:35
Authorities in Europe and North America have announced the dismantling of a criminal virtual private network (VPN) service used by criminal actors to obscure the origins of ransomware attacks, data theft, scanning, and denial-of-service attacks. Codenamed Operation Saffron, the disruption of First VPN Service was led by France and the Netherlands, with several other nations supporting the
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malwareby info@thehackernews.com (The Hacker News) on 22/05/2026 at 16:20
The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151) has been observed using lures related to Prometheus, a Ukrainian online learning platform, to target government organizations in the country. The activity, per the Computer Emergency Response Team of Ukraine (CERT-UA), involves sending phishing emails to government entities using compromised accounts. It's been
- Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflowsby info@thehackernews.com (The Hacker News) on 22/05/2026 at 11:55
Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon that has pushed 5,718 malicious commits to 5,561 GitHub repositories within a six-hour window. "Using throwaway accounts and forged author identities (build-bot, auto-ci, ci-bot, pipeline-bot), the attacker injected GitHub Actions workflows containing base64-encoded bash payloads that exfiltrate CI








